Goal 1 improve the accuracy of patient identification.nps
1. Goal 1
Improve the accuracy of patient identification.
NPSG.01.01.01
Use at least two patient identifiers when providing care,
treatment, and services.
--Rationale for NPSG.01.01.01--
Wrong-patient errors occur in virtually all stages of diagnosis
and treatment. The intent for this goal is two-
fold: first, to reliably identify the individual as the person for
whom the service or treatment is intended;
second, to match the service or treatment to that individual.
Acceptable identifiers may be the individual’s
name, an assigned identification number, telephone number, or
other person-specific identifier.
Newborns are at higher risk of misidentification due to their
inability to speak and lack of distinguishable
features. In addition to well-known misidentification errors
such as wrong patient/wrong procedure,
misidentification has also resulted in feeding a mother’s
expressed breastmilk to the wrong newborn, which
poses a risk of passing bodily fluids and potential pathogens to
the newborn. A reliable identification system
among all providers is necessary to prevent errors.
Element(s) of Performance for NPSG.01.01.01
1. Use at least two patient identifiers when administering
3. Goal 2
Improve the effectiveness of communication among caregivers.
NPSG.02.03.01
Report critical results of tests and diagnostic procedures on a
timely basis.
--Rationale for NPSG.02.03.01--
Critical results of tests and diagnostic procedures fall
significantly outside the normal range and may indicate
a life-threatening situation. The objective is to provide the
responsible licensed caregiver these results within
an established time frame so that the patient can be promptly
treated.
Element(s) of Performance for NPSG.02.03.01
1. Develop written procedures for managing the critical results
of tests and diagnostic procedures that
address the following:
- The definition of critical results of tests and diagnostic
procedures
- By whom and to whom critical results of tests and diagnostic
procedures are reported
- The acceptable length of time between the availability and
reporting of critical results of tests and
diagnostic procedures
2. Implement the procedures for managing the critical results of
tests and diagnostic procedures.
3. Evaluate the timeliness of reporting the critical results of
tests and diagnostic procedures.
4. Goal 3
Improve the safety of using medications.
NPSG.03.04.01
Label all medications, medication containers, and other
solutions on and off the sterile field in perioperative and other
procedural settings.
Note: Medication containers include syringes, medicine cups,
and basins.
--Rationale for NPSG.03.04.01--
Medications or other solutions in unlabeled containers are
unidentifiable. Errors, sometimes tragic, have
resulted from medications and other solutions removed from
their original containers and placed into
unlabeled containers. This unsafe practice neglects basic
principles of safe medication management, yet it is
routine in many organizations.
The labeling of all medications, medication containers, and
other solutions is a risk-reduction activity
consistent with safe medication management. This practice
addresses a recognized risk point in the
administration of medications in perioperative and other
procedural settings. Labels for medications and
medication containers are also addressed at Standard
MM.05.01.09.
Element(s) of Performance for NPSG.03.04.01
1. In perioperative and other procedural settings both on and off
the sterile field, label medications and
solutions that are not immediately administered. This applies
even if there is only one medication
6. 4. Verify all medication or solution labels both verbally and
visually. Verification is done by two individuals
qualified to participate in the procedure whenever the person
preparing the medication or solution is
not the person who will be administering it.
5. Label each medication or solution as soon as it is prepared,
unless it is immediately administered.
Note: An immediately administered medication is one that an
authorized staff member prepares or
obtains, takes directly to a patient, and administers to that
patient without any break in the process.
6. Immediately discard any medication or solution found
unlabeled.
7. Remove all labeled containers on the sterile field and discard
their contents at the conclusion of the
procedure.
Note: This does not apply to multiuse vials that are handled
according to infection control practices.
8. All medications and solutions both on and off the sterile field
and their labels are reviewed by entering
and exiting staff responsible for the management of
medications.
NPSG.03.05.01
Reduce the likelihood of patient harm associated with the use of
anticoagulant therapy.
Note: This requirement does not apply to routine situations in
which short-term prophylactic anticoagulation is used for
preventing venous thromboembolism (for example, related to
procedures or hospitalization).
7. --Rationale for NPSG.03.05.01--
Anticoagulation therapy can be used as therapeutic treatment
for several conditions, the most common of
which are atrial fibrillation, deep vein thrombosis, pulmonary
embolism, and mechanical heart valve implant.
However, it is important to note that anticoagulant medications
are more likely than others to cause harm due
to complex dosing, insufficient monitoring, and inconsistent
patient compliance. This National Patient Safety
Goal has great potential to positively impact the safety of
patients on this class of medications, including
improving patient outcomes.
To achieve better patient outcomes, patient education is a vital
component of an anticoagulation therapy
program. Effective anticoagulation education includes face-to-
face interaction with a trained professional who
works closely with patients to be sure that they understand the
risks involved with anticoagulation therapy
and the precautions they need to take. The use of standardized
practices for anticoagulation therapy that
include patient involvement can reduce the risk of adverse drug
events associated with heparin
(unfractionated), low molecular weight heparin, warfarin, and
direct oral anticoagulants (DOACs).
Element(s) of Performance for NPSG.03.05.01
1. The hospital uses approved protocols and evidence-based
practice guidelines for the initiation and
maintenance of anticoagulant therapy that address medication
selection; dosing, including
adjustments for age and renal or liver function; drug–drug and
drug–food interactions; and other risk
10. January 2021 for the Hospital Program
Introduction to Reconciling Medication Information
The large number of people receiving health care who take
multiple medications and the
complexity of managing those medications make medication
reconciliation an important safety
issue. In medication reconciliation, a clinician compares the
medications a patient should be using
(and is actually using) to the new medications that are ordered
for the patient and resolves any
discrepancies.
The Joint Commission recognizes that organizations face
challenges with medication reconciliation.
The best medication reconciliation requires a complete
understanding of what the patient was
prescribed and what medications the patient is actually taking.
It can be difficult to obtain a
complete list from every patient in an encounter, and accuracy
is dependent on the patient’s ability
and willingness to provide this information. A good faith effort
to collect this information is
recognized as meeting the intent of the requirement. As health
care evolves with the adoption of
more sophisticated systems (such as centralized databases for
prescribing and collecting
medication information), the effectiveness of these processes
will grow.
This National Patient Safety Goal (NPSG) focuses on the risk
points of medication reconciliation.
The elements of performance in this NPSG are designed to help
organizations reduce negative
11. patient outcomes associated with medication discrepancies.
Some aspects of the care process that
involve the management of medications are addressed in the
standards rather than in this goal.
These include coordinating information during transitions in
care both within and outside of the
organization (PC.02.02.01), patient education on safe
medication use (PC.02.03.01), and
communications with other providers (PC.04.02.01).
In settings where medications are not routinely prescribed or
administered, this NPSG provides
organizations with the flexibility to decide what medication
information they need to collect based
on the services they provide to patients. It is often important for
clinicians to know what medications
the patient is taking when planning care, treatment, and
services, even in situations where
medications are not used.
NPSG.03.06.01
Maintain and communicate accurate patient medication
information.
--Rationale for NPSG.03.06.01--
There is evidence that medication discrepancies can affect
patient outcomes. Medication reconciliation is
intended to identify and resolve discrepancies—it is a process
of comparing the medications a patient is
taking (or should be taking) with newly ordered medications.
The comparison addresses duplications,
omissions, and interactions, and the need to continue current
medications. The types of information that
clinicians use to reconcile medications include (among others)
14. Page 6 of 14
Report Generated by DSSM
Wednesday, Oct 28 2020
National Patient Safety Goals Effective
January 2021 for the Hospital Program
Goal 6
Reduce patient harm associated with clinical alarm systems.
NPSG.06.01.01
Improve the safety of clinical alarm systems.
--Rationale for NPSG.06.01.01--
Clinical alarm systems are intended to alert caregivers of
potential patient problems, but if they are not
properly managed, they can compromise patient safety. This is a
multifaceted problem. In some situations,
individual alarm signals are difficult to detect. At the same
time, many patient care areas have numerous
alarm signals and the resulting noise and displayed information
tends to desensitize staff and cause them to
miss or ignore alarm signals or even disable them. Other issues
associated with effective clinical alarm
system management include too many devices with alarms,
default settings that are not at an actionable
level, and alarm limits that are too narrow. These issues vary
greatly among hospitals and even within
different units in a single hospital.
There is general agreement that this is an important safety issue.
15. Universal solutions have yet to be
identified, but it is important for a hospital to understand its
own situation and to develop a systematic,
coordinated approach to clinical alarm system management.
Standardization contributes to safe alarm
system management, but it is recognized that solutions may
have to be customized for specific clinical units,
groups of patients, or individual patients. This NPSG focuses on
managing clinical alarm systems that have
the most direct relationship to patient safety.
Note: Additional information on alarm safety can be found on
the AAMI website
https://www.aamifoundation.org/coalitions/clinical-alarm-
systems/complementary-research/.
Element(s) of Performance for NPSG.06.01.01
1. Leaders establish alarm system safety as a hospital priority.
2. Identify the most important alarm signals to manage based on
the following:
- Input from the medical staff and clinical departments
- Risk to patients if the alarm signal is not attended to or if it
malfunctions
- Whether specific alarm signals are needed or unnecessarily
contribute to alarm noise and alarm
fatigue
- Potential for patient harm based on internal incident history
- Published best practices and guidelines
(For more information on managing medical equipment risks,
refer to Standard EC.02.04.01)
3. Establish policies and procedures for managing the alarms
identified in EP 2 above that, at a
minimum, address the following:
- Clinically appropriate settings for alarm signals
17. guidelines.
--Rationale for NPSG.07.01.01--
According to the Centers for Disease Control and Prevention,
each year, millions of people acquire an
infection while receiving care, treatment, and services in a
health care organization. Consequently, health
care–associated infections (HAIs) are a patient safety issue
affecting all types of health care organizations.
One of the most important ways to address HAIs is by
improving the hand hygiene of health care staff.
Compliance with the World Health Organization (WHO) or
Centers for Disease Control and Prevention (CDC)
hand hygiene guidelines will reduce the transmission of
infectious agents by staff to patients, thereby
decreasing the incidence of HAIs. To ensure compliance with
this National Patient Safety Goal, an
organization should assess its compliance with the CDC and/or
WHO guidelines through a comprehensive
program that provides a hand hygiene policy, fosters a culture
of hand hygiene, monitors compliance, and
provides feedback.
Element(s) of Performance for NPSG.07.01.01
1. Implement a program that follows categories IA, IB, and IC
of either the current Centers for Disease
Control and Prevention (CDC) or the current World Health
Organization (WHO) hand hygiene
guidelines. (See also IC.01.04.01, EP 1)
2. Set goals for improving compliance with hand hygiene
guidelines. (See also IC.03.01.01, EP 1)
3. Improve compliance with hand hygiene guidelines based on
19. physical environment that could be used
to attempt suicide; the hospital takes necessary action to
minimize the risk(s) (for example, removal of
anchor points, door hinges, and hooks that can be used for
hanging).
For nonpsychiatric units in general hospitals: The organization
implements procedures to mitigate the
risk of suicide for patients at high risk for suicide, such as one-
to-one monitoring, removing objects that
pose a risk for self-harm if they can be removed without
adversely affecting the patient’s medical care,
assessing objects brought into a room by visitors, and usi ng safe
transportation procedures when
moving patients to other parts of the hospital.
Note: Nonpsychiatric units in general hospitals do not need to
be ligature resistant. Nevertheless,
these facilities should routinely assess clinical areas to identify
objects that could be used for self-harm
and remove those objects, when possible, from the area around a
patient who has been identified as
high risk for suicide. This information can be used for training
staff who monitor high-risk patients (for
example, developing checklists to help staff remember which
equipment should be removed when
possible).
2. Screen all patients for suicidal ideation who are being
evaluated or treated for behavioral health
conditions as their primary reason for care using a validated
screening tool.
Note: The Joint Commission requires screening for suicidal
ideation using a validated tool starting at
age 12 and above.
3. Use an evidence-based process to conduct a suicide
21. January 2021 for the Hospital Program
The hospital identifies safety risks inherent in its patient
population.
Goal 15
Introduction to the Universal Protocol for Preventing Wrong
Site, Wrong
Procedure, and Wrong Person Surgery™
The Universal Protocol applies to all surgical and nonsurgical
invasive procedures. Evidence indicates that
procedures that place the patient at the most risk include those
that involve general anesthesia or deep
sedation, although other procedures may also affect patient
safety. Hospitals can enhance safety by correctly
identifying the patient, the appropriate procedure, and the
correct site of the procedure.
The Universal Protocol is based on the following principles:
- Wrong-person, wrong-site, and wrong-procedure surgery can
and must be prevented.
- A robust approach using multiple, complementary strategies is
necessary to achieve the goal of always
conducting the correct procedure on the correct person, at the
correct site.
- Active involvement and use of effective methods to improve
communication among all members of the
procedure team are important for success.
- To the extent possible, the patient and, as needed, the family
are involved in the process.
- Consistent implementation of a standardized protocol is most
effective in achieving safety.
23. UP.01.01.01
Conduct a preprocedure verification process.
--Rationale for UP.01.01.01--
Hospitals should always make sure that any procedure is what
the patient needs and is performed on the
right person. The frequency and scope of the verification
process will depend on the type and complexity of
the procedure.
The preprocedure verification is an ongoing process of
information gathering and confirmation. The purpose
of the preprocedure verification process is to make sure that all
relevant documents and related information
or equipment are as follows:
- Available prior to the start of the procedure
- Correctly identified, labeled, and matched to the patient’s
identifiers
- Reviewed and are consistent with the patient’s expectations
and with the team’s understanding of the
intended patient, procedure, and site
Preprocedure verification may occur at more than one …
Loading...
25. 1 article(s) will be saved.
To continue, in Internet Explorer, select
FILE
then
SAVE AS
from your browser's toolbar above.
Be sure to save as a plain text file (.txt) or a
'Web Page, HTML only' file (.html).
In FireFox, select
FILE
then
SAVE FILE AS
from your browser's toolbar above.
In Chrome, select right click (with your mouse)
on this page and select
SAVE AS
26. EBSCO Publishing Citation Format:
APA (American Psychological Assoc.):
NOTE: Review the instructions at
http://support.ebsco.com/help/?int=ehost&lang=&feature_id=AP
A
and make any necessary
corrections before using. Pay special attention to personal
names, capitalization, and dates. Always consult your library
resources for the exact formatting and punctuation guidelines.
References
Rainie, L., & Wellman, B. (2012). Future of the networked.
New Scientist, 215(2875), 24–25.
https://doi.org/10.1016/S0262-4079(12)61936-8
<!--Additional Information:
Persistent link to this record (Permalink):
https://search.ebscohost.com/login.aspx?direct=true&AuthType
=shib&db=a2h&AN=78189512&site=ehost-
live&scope=site&custid=uphoenix
End of citation-->
Future of the networked
OPINION
An always-on world is rapidly reshaping human social
interactions. Expect a battle between freedom and control, say
Lee Rainie and Barry Wellman
OUR social relationships are changing and technology is at the
centre of this unfolding story.
Take stock of your own world. You probably have a few family
27. members and friends who mean the world to you. Then there are
the many acquaintances, contacts, "followers" and
"consequential strangers" who you only interact with
occasionally but who serve useful purposes when you have
questions, need to make decisions or require a helping hand.
Your ties to all of them, especially those in the outer reaches of
your network, are increasingly mediated through digital
technology -- from email to Facebook to Skype calls.
This new social operating system has been emerging for several
generations but has accelerated in growth thanks to the recent
triple revolution: the widespread adoption of broadband,
ubiquitous mobile connectivity and the move from bounded
groups -- largely closed circles of interlinked contacts -- to
multiple social networks.
We have dubbed the result networked individualism because
loose-knit networks are overtaking more densely knit groups
and traditional hierarchies as the dominant structure of social
interaction.
In the world of networked individuals, the individual is the
focus, not the family, the work unit, the neighbourhood or the
social group. Each person creates their own network tailored to
their needs, maintaining it through their email address and
address book, screen name, social and technological filters, and
cellphone number.
Networks are thriving. People have more strong ties as well as
weak ones. The number of people on the periphery of each
network is growing. In this Web 2.0 world, community-building
can take new forms. Hobbyists, the civic minded, caregivers,
spiritual pathfinders and many others have the option of
plugging into existing communities or building their own --
which they often do.
This revolution doesn't mean physical isolation, as some fear.
People still value neighbours, because they remain important for
everyday socialising and emergencies. Yet neighbours are only
about 10 per cent of our significant ties. While people see co-
workers and neighbours often, the most important contacts tend
28. to be with people who live elsewhere in the city, region, nation
-- and abroad.
The new media are able to facilitate such contact, and, in effect,
have become the neighbourhood. And it is heavily populated.
Data from the Pew Research Center's Internet & American Life
Project suggests that more than two-thirds of American adults
and three-quarters of teenagers have become online content
creators through social media and rankings, ratings,
commenting and remixing applications. In this world, people
can easily locate and connect with others who share their tastes,
lifestyles, politics, spiritual practices, ailments or professional
aspirations.
With such a fundamental social shift linked to still-developing
technology, how it unfolds needs to be considered. We think
there are two possible scenarios.
In the first, virtual assistants operating in a semantic web-one in
which machines can better assess the ocean of information --
seamlessly mesh a user's life logistics and interests, allowing
people to be more productive and more effective at integrating
their needs. The merger of data and the physical environment,
especially in augmented reality apps, enriches people's
experiences as they can summon information about the things
they are observing -- a landscape, buildings in an unfamiliar
city or even faces of those they encounter.
In this benign world, the challenges of information overload are
reduced as these smart agents perform filtering and relevance
tests. This lets people interact with their social networks and
growing information stores in productive and socially beneficial
ways.
In the second scenario, a walled online world of tight corporate
permissions and Big Brotherish surveillance by business and the
state limits networked life. Personal agents turn out to be
double agents, feeding back information on users that can be
sold. People are limited in what they can do with their media
and networks by those determined to prevent pirating of
content.
29. Moreover, tech firms and their advertising allies scan users'
behaviour for commercial exploitation. People's social network
practices are quarantined inside filter bubbles that assume they
want homogenised content and contact with like-minded
individuals, rather than a diversified, broad outreach.
Which will unfold? The future will likely include parts of each.
The architecture of the internet -- dominated by the hacker
ethic-will facilitate open networks and all the social connection
that goes with them. Legal struggles over content ownership and
the cost of access may lead to restrictions that could limit the
capacity for users to do what they want.
Evolving social norms will push both ways. Some will
encourage openness as people want to connect; others will
encourage limits as the hassled and hard-pressed withdraw
occasionally.
In short, the world will fragment, with some parts moving
towards the brighter side of networked individualism and other
parts moving towards gated communities and more tightly
controlled information flows.
The triple revolution has given rise to far-reaching
consequences, though it is not yet clear what the outermost
points of impact will be. What is evident is that networked
individualism is tightly tied to technological changes on the
horizon and that the time is ripe to contemplate the shape of
things to come.
~~~~~~~~
By Lee Rainie and Barry Wellman
Lee Rainie directs the Pew Research Center's Internet&
American Life Project based in Washington DC. Barry Wellman
is a professor of sociology and director of NetLab at the
University of Toronto, Canada. Their new book, Networked, is
out now (MIT Press)
Copyright of New Scientist is the property of New Scientist Ltd.
and its content may not be copied or emailed to multiple sites or
30. posted to a listserv without the copyright holder's express
written permission. However, users may print, download, or
email articles for individual use.
Back
Encyclopedia of Communication Theory
Computer-Mediated Communication
Contributors: Author:David Holmes
Edited by: Stephen W. Littlejohn & Karen A. Foss
Book Title: Encyclopedia of Communication Theory
Chapter Title: "Computer-Mediated Communication"
Pub. Date: 2009
Access Date: February 23, 2021
Publishing Company: SAGE Publications, Inc.
City: Thousand Oaks
Print ISBN: 9781412959377
Online ISBN: 9781412959384
DOI: http://dx.doi.org/10.4135/9781412959384. n64
Print pages: 162-164
32. computers for communication, to the point
that today, CMC is often used interchangeably with online
Internet communication. Thus e-mail, chat rooms,
bulletin boards, and simulated worlds are all forms of CMC. But
the distinguishing feature here is that what
is being mediated is communication—not information or
entertainment. Browsing the World Wide Web and
downloading information—the primary activity of Web 1.0 (the
original use of the Internet)—are not examples
of CMC. Rather, communication between individuals, whether
one-to-one or many-to-many, sharing text,
sounds, and images in Web 2.0, and interacting in next-
generation environments are examples. However,
the most common forms of CMC are e-mail, with its very low
bandwidth, or the broader-banded online social
networking outlets, in which users can post images or music.
But in each case, text predominates.
A further division here is between synchronous and
asynchronous CMC. Many chat sites, such as the early
Internet Relay Chat and “I seek you,” Multi-User Dungeons
(MUDs) and MUDs object oriented (MOOs), and
today's Second Life are in real time. The bulk of CMC,
however, is asynchronous, with e-mail and online
social networking offering the convenience of communication
that can be stored in a threaded conversation.
The fact that there are several varieties of CMC, according to
temporal and bandwidth qualities, has led some
researchers to problematize the status and nature of interactivity
in CMC.
Interactivity
Founder of the Journal of Computer-Mediated Communication,
Sheizaf Rafaeli is a key theorist who can
33. assist in understanding interaction within CMC. In an important
1988 article, Rafaeli distinguishes between
connectivity, reactivity, and interactivity. Networks must have a
human interface, but they must also have an
architecture that makes interactivity possible. Such interactive
networks, once established, take on a history
of their own, and through such a history, relationships are
formed. Two-way communication does not, in
itself, guarantee interactivity. Rather, an exchange or action-
reaction must develop into a relationship in which
one utterance becomes a context for another. Without this form
of connectivity, relationships become either
circular or solipsistic.
Rafaeli also wants to abandon the dyadic model that is applied
to most CMC. Online interactivity is distributed
across a network and cannot be reduced to the sum of a point-
to-point exchange. Every message takes
into account preceding messages, as well as the ways in which
previous messages react to one another.
This view of interactivity suggests that the actual use of CMC is
seldom interactive, particularly in cases of
anonymity in CMC discussion groups. For this reason, a
fundamental distinction needs to be made between
CMC users and groups that have other outside relationships and
those that do not.
Computer-Mediated Communication Research Directions
This distinction corresponds to two dominant directions in CMC
research—the cues-filter ed-out approach,
which focuses research on users, and avatar research. When
CMC is experienced as an extension of
interpersonal or institutional relationships online, interlocutors
are generally referred to as users. When
35. goes into bringing these external contexts
into the content of interaction.
Baym also identifies five different sources of impact on CMC:
(1) external contexts, in which the use of
CMC is set (language, city); (2) the temporal structure of the
group (synchronistic or asynchronistic); (3)
the infrastructure of the computer system (speed, number of
computers, capacity for anonymity, user-
friendliness); (4) the purposes for which the CMC is used
(interest oriented, uses and gratifications); and (5)
the characteristics of the group and its members (group size,
educational level of participants).
Avatar Research
The second direction of CMC research—avatar research—which
was very popular in the late 1990s,
champions the exclusion of external contexts of CMC. This
research argues that online identities, or avatars,
enjoy a neutral space of interaction. Because there are no cues
that can spontaneously signify an
interlocutor's appearance, gender, class, and ethnicity, avatars
are seen to communicate on an equal footing,
without any of the social discrimination that accompanies the
above categories. An avatar can exist in a
number of CMC environments. The avatar's identity may be
limited to textual representation, or in the case of
many synchronous forms of simulated CMC—such as MUDs,
MOOs, and Second Life—an avatar can take
on a visual form and adopt voices and behavior that are
constructed online. The avatar does not have an
identity or a history other than what is formed online.
In the 1990s, the question of online identity represented by the
avatar was a major source of fascination for
37. SAGE Reference
Page 3 of 4
Encyclopedia of Communication Theory
In recent years, the interest in the avatar has waned and is of
little interest to the net generation of young
people who are born as “digital natives” and have not faced the
novelty of having to migrate to digital culture.
As Susan Herring has noted, the net generation does not relate
well to the utopian speculations or the
debates about online democracy, identity, and virtuality of
earlier decades.
• avatars
• interactivity
• cues
• computer-mediated communication
• speech acts
• computers
• telephony
David Holmes
http://dx.doi.org/10.4135/9781412959384.n64
See also
• Digital Cultures
• Media Equation Theory
• Network Society
• New Media Theory
• Presence Theory
Further Readings
38. Baym, N.(1998).The emergence of online community. In
S.Jones (Ed.), Cybersociety: Computer-mediated
communication and community (pp. 138–163). Thousand Oaks,
CA: Sage.
Haythornthwaite, C., & Wellman, B.(2002).The Internet and
everyday life: An introduction. In B.Wellman, &
C.Haythornthwaite (Eds.), The Internet and everyday life (pp.
3–41). Malden, MA: Blackwell.
Herring, S.Slouching towards the ordinary: Current trends in
computer-mediated communication.New Media
and Society6(2004).26–
36.http://dx.doi.org/10.1177/1461444804039906
Nancy, J.-L.(1991).The Inoperative Community (ed. P.Connor;
trans. PeterConnor, LisaGarbus,
MichaelHilland, and SimonaSawhney). Minneapolis: University
of Minnesota Press.
Rafaeli, S.(1988).Interactivity: From new media to
communication. In R. P.Hawkins, J. M.Wiemann, &
S.Pingree (Eds.), Sage annual review of communication
research: Advancing communication science, Vol.
16 (pp. 10–134). Beverly Hills, CA: Sage.
Rafaeli, S., and Sudweeks, F.Networked interactivity.Journal of
Computer-Mediated
Communication2(4)(1997).Retrieved February 11, 2009, from
http://jcmc.indiana.edu/v012/issue4/
rafaeli.sudweeks.html
Riva, G., and Galimberti, C.Computer-mediated communication:
Identity and social interaction in an electronic
environment.Genetic, Social and General Psychology
Monographs124(1998).434–464.
Turkle, S.(1995).Life on the screen: Identity in the age of the
Internet.New York: Simon & Schuster.
Wellman, B., & Gulia, M.(1999).Virtual communities as
communities: Net surfers don't ride alone. In M.Smith,
& P.Kollock (Eds.), Communities in cyberspace (pp. 167–194).
London: Routledge.
41. This PDF has been generated from SAGE Knowledge. Please
note that the pagination of the online
version will vary from the pagination of the print book.
javascript:void(0);
javascript:void(0);
http://dx.doi.org/10.4135/9781412958479.n98
Computer-mediated communication is the domain of human
communication in which individuals and groups
interact, form impressions, establish relationships, and
accomplish tasks using networked computers.
Although the timing and stylistic features of communication
often distinguish online from offline relationship
development and management, people can initiate relationships,
establish effective groups, and develop
personal partnerships using computer systems.
Generally speaking, people interacting on computers have
access to fewer nonverbal cues than those who
interact in person. Although early research predicted that people
would not be able to form meaningful
relationships using computer-mediated communication,
subsequent studies have demonstrated that
relational communication is indeed amenable to online
interaction. Because there are fewer nonverbal
cues available to people who are interacting on computers, it
typically takes longer for people to achieve
their interpersonal goals than when they interact on a face-to-
face basis. Malcolm Parks provides a useful
metaphor for understanding this aspect of computer-mediated
communication: Interpersonal interaction via
computers is a garden hose. Interpersonal information can flow
42. like water through the hose and fill a container
(an interpersonal impression) just as well as can a large fire
hose; it just takes longer with the smaller hose.
Since the language and timing of written messages exchanged
via computer systems convey all the social
information, with no additional matter relayed by nonverbal
behavior, it takes longer for people interacting on
computers to accrue sufficient social information with which to
form and transmit impressions and affective
influence statements.
In some cases individuals form more positive impressions of
others via computer-mediated communication
than they would form had they had a face-to-face conversation.
This phenomenon is known as hyperpersonal
communication. The nature of computer-mediated
communication contributes to the phenomenon of
hyperpersonal effects. One characteristic is that
computermediated communication allows people to carefully
select the ways that they present themselves. For example,
college students may carefully edit their grammar
when they interact with their professors on the computer so that
their professors will infer that they are
bright and conscientious. Also, because people are not located
in the same place during computer-mediated
communication and cannot observe their partners' normal
appearance and traits, people idealize their
partners' charac teristics. For example, a couple who met on an
online dating site and had their first
interactions online may overattribute the similarity and
attractiveness of their partners. Computer-mediated
communication also allows users to craft their messages quite
deliberately and edit them to fit their desired
self- and partner-oriented stereotypes and communication goals.
Computer-mediated communication is also
hypothesized to foster mutual influence of idealizing responses
43. so that users come to act in ways consistent
with the desires their communication partners envision of them.
Hyperpersonal communication tends to occur
quickly when people plan to have ongoing interaction with
others.
One feature that is common in some computermediated
communication settings is anonymous
communication. Anonymous communication occurs when people
communicate with one another without
knowing the specific personal identities of those with whom
they are interacting. When people are anonymous
in computer-mediated groups, they tend to be influenced by
group dynamics more strongly than they
otherwise would. Researchers believe that this occurs when
people are relating to others and thinking of
themselves as members of social groups or categories as
opposed to operating as if they were unique
individuals. This has the effect of causing people in computer -
mediated groups to exhibit behavior that is
consistent with group norms. This effect is particularly strong
when there is another group, an outgroup, which
members implicitly reject. The effect of group norms has been
used to explain the occasional occurrence of
flaming in online groups, that is, the contagious reciprocation
of insults and profanities. Early research claimed
that this kind of misbehavior was a result of the lack of
nonverbal cues in computermediated communication,
and individuals' inability to assess situational norms when they
were online. Group identification research
provides a better account of flaming, however: When it appears
in some groups, it is reciprocated and
becomes normative for that group. This is why flaming is not
endemic to all computer-mediated
communication: It is a function of local group norms
exacerbated by anonymity, and not a function of online
45. with one another. Current research is exploring
the characteristics of personal information about online
acquaintances which make it either more or less
believable. It appears that information is more believable when
the person it describes is unlikely to be able
to create or manipulate it.
New technologies also support mixed-mode relationships that
began offline. Social networking technologies
such as Facebook and MySpace allow friends to carry on
relationships that move between online and offline
venues. Social networking technologies also help people to stay
in touch easily with larger networks of
acquaintances. These technologies have allowed people who
were once out of touch to reconnect easily with
one another and continue their relationships online. They are a
vital tool for relational maintenance.
Brandon Van Der Heide & , and Joseph B. Walther
http://dx.doi.org/10.4135/9781412958479.n98
See also
• Communication, Instant Messaging and Other New Media
• First Impressions
• Internet, Attraction on
• Internet Dating
• Technology and Relationships
Further Readings
Lampe, C., Ellison, N., & Steinfield, C.(2007).A familiar
Face(book): Profile elements as signals in an online
social network. Proceedings of the SIGCHI Conference on
Human Factors in Computing Systems (pp.
435–444). New York: ACM
Press.http://dx.doi.org/10.1145/1240624.1240695